Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • News
  • Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

by Ayman Hamam / Monday, 17 February 2025 / Published in News

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress.

Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.

Users who attempt to do so during phone calls are served the message: “Scammers often request this type of action during phone call conversations, so it’s blocked to protect you,” If you are being guided to take this action by someone you don’t know, it might be a scam.”

Furthermore, it blocks users from giving an app access to accessibility over the course of a phone call.

The feature is currently live in Android 16 Beta 2, which was released earlier this week. With this latest addition, the idea is to introduce more friction to a tactic that has been commonly abused by malicious actors to deliver malware.

Dubbed telephone-oriented attack delivery (TOAD), these approaches involve sending SMS messages to prospective targets and instructing them to call a number by inducing a false sense of urgency.

Last year, NCC Group and Finland’s National Cyber Security Centre (NCSC-FI) disclosed that cybercriminals were distributing dropper apps using a combination of SMS messages and phone calls to trick them into installing malware such as Vultr.

The development comes after Google expanded restricted settings to cover more permission categories in order to prevent sideloaded apps from accessing sensitive data.

It has also rolled out the ability to automatically block sideloading of potentially unsafe apps in markets like Brazil, Hong Kong, India, Kenya, Nigeria, Philippines, Singapore, South Africa, Thailand, and Vietnam to tackle fraud.

  • Tweet
Tagged under: accessibility restrictions, Android 16, Android security, anti-scam feature, ASC, cyberSecurity, fraud prevention, Google security update, malware prevention, sideloading protection, TOAD attack

What you can read next

Hackers targeting European entities with MQsTTang backdoors
The new malware ‘Letscall’ uses voice traffic routing to send audio
Cryptocurrency is stolen through a new malware campaign using Satacom Downloader

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP